Storage volume protection supporting legacy systems
First Claim
Patent Images
1. A method implemented in a computing device, the method comprising:
- accessing an encrypted storage volume having been encrypted using an encryption technique supported by some operating systems but not by other operating systems;
if the encryption technique is unsupported by an operating system of the computing device, then;
identifying an access application on the encrypted storage volume;
executing the access application, the access application allowing the computing device to access encrypted data files stored in a first portion of the encrypted storage volume;
accessing a file directory in a second portion of the encrypted storage volume, the file directory identifying locations of one or more files in the second portion as well as locations of multiple cover files in the first portion that include the encrypted data files; and
the access application accessing a protected file directory in the first portion, the protected file directory being stored across two or more of the multiple cover files and identifying locations of the encrypted data files in the first portion; and
if the encryption technique is supported by the operating system of the computing device, then;
the operating system allowing the computing device to bypass the access application and access the encrypted data files stored on the encrypted storage volume.
2 Assignments
0 Petitions
Accused Products
Abstract
A storage volume is encrypted using a particular encryption technique, the storage volume including an access application and one or more cover files. The access application can be executed by a computing device having an operating system lacking support for the particular encryption technique, and allows the computing device to access data on the storage volume encrypted using the particular encryption technique.
-
Citations
20 Claims
-
1. A method implemented in a computing device, the method comprising:
-
accessing an encrypted storage volume having been encrypted using an encryption technique supported by some operating systems but not by other operating systems; if the encryption technique is unsupported by an operating system of the computing device, then; identifying an access application on the encrypted storage volume; executing the access application, the access application allowing the computing device to access encrypted data files stored in a first portion of the encrypted storage volume; accessing a file directory in a second portion of the encrypted storage volume, the file directory identifying locations of one or more files in the second portion as well as locations of multiple cover files in the first portion that include the encrypted data files; and the access application accessing a protected file directory in the first portion, the protected file directory being stored across two or more of the multiple cover files and identifying locations of the encrypted data files in the first portion; and if the encryption technique is supported by the operating system of the computing device, then; the operating system allowing the computing device to bypass the access application and access the encrypted data files stored on the encrypted storage volume. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method implemented in a computing device, the method comprising:
-
generating a discovery volume portion on a storage volume; storing, in the discovery volume portion, an access application that can be bypassed by a first additional computing device having an operating system supporting an encryption technique used to encrypt the storage volume, and that can be executed by a second additional computing device having an operating system lacking support for the encryption technique used to encrypt the storage volume, the access application allowing the second additional computing device to access data on the storage volume encrypted using the encryption technique; and storing, across multiple cover files on the storage volume, a protected file directory identifying where one or more encrypted files are stored on the storage volume, the multiple cover files including the one or more encrypted files, and the protected file directory allowing the first additional computing device to access the one or more encrypted files. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 20)
-
-
18. A storage volume comprising:
-
a first portion storing both one or more encrypted files and a protected file directory of the one or more encrypted files, the protected file directory being accessible to one or more devices with operating systems that support an encryption technique used by the storage volume, the protected file directory allowing the one or more devices with operating systems that support the encryption technique used by the storage volume to bypass an access application, the one or more encrypted files being stored in multiple cover files of the first portion, and the protected file directory being stored across two or more of the multiple cover files; a second portion storing both the access application that is executed by one or more other devices with operating systems that lack support for the encryption technique used by the storage volume and a file directory of one or more files in the second portion as well as the multiple cover files in the first portion, wherein execution of the access application can be done without administrator privileges on the one or more other devices; and the access application, when executed, verifying credentials of a user of one of the one or more other devices and allowing the user to access the one or more encrypted files even though the one of the one or more other devices lacks support for the encryption technique used by the storage volume. - View Dependent Claims (19)
-
Specification